Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. ....Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. Sensor networks have data like this, and they play a vital role in environmental monitoring. Cloud computing platforms also have this type of data, and these allow smaller enterprises to grow smoothly, without needing large up-front investments in computing infrastructure.Read moreRead less
Quality of Service in 3G Wireless Systems with Hybrid Networks. The increasing demand of providing Internet-based services over the mobile handsets has led to the transition from circuit-based 2G systems to packet-based network architectures in the emerging 3G systems. A major technical challenge for this paradigm shift is maintaining quality of services (QoS) for the existing data and voice and future Internet services such as streaming multimedia over such packet switching networks. This proje ....Quality of Service in 3G Wireless Systems with Hybrid Networks. The increasing demand of providing Internet-based services over the mobile handsets has led to the transition from circuit-based 2G systems to packet-based network architectures in the emerging 3G systems. A major technical challenge for this paradigm shift is maintaining quality of services (QoS) for the existing data and voice and future Internet services such as streaming multimedia over such packet switching networks. This project aims to investigate end-to-end QoS solutions in the 3G systems. Australian mobile Internet and voice carriers will significantly benefit from this technology.Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in ....Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in two field settings will test the impact of selected interventions on task performance following training. The outcomes will inform Australian industry on models of effective implementation and provide guidance to increase the productivity of personnel using software systems.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
Computational Methods for the Social Accounting of Teamwork. The cornerstone of the knowledge industries underlying the Australian economy is not just mechanical efficiency but also teamwork productivity. The increasing trend toward placing Australian employees nearer to their customers means that Australian companies face an even greater challenge in managing effective teamwork. This research examines the pragmatics and theoretical issues of developing computer-based systems that enable real-ti ....Computational Methods for the Social Accounting of Teamwork. The cornerstone of the knowledge industries underlying the Australian economy is not just mechanical efficiency but also teamwork productivity. The increasing trend toward placing Australian employees nearer to their customers means that Australian companies face an even greater challenge in managing effective teamwork. This research examines the pragmatics and theoretical issues of developing computer-based systems that enable real-time assessments of teamwork productivity. Automated assessments of how well relationships are progressing in teams will enable them to realise the same levels of productivity gains that automated workflow management has facilitated.Read moreRead less
Applying Method Engineering Techniques to the Construction of Agile Methodologies. Agile approaches to software development provide flexibility within the method but provide no assistance for improving the selected method. This second kind of flexibility is important to permit organizations to improve with time. To accomplish such improvement, a method engineering approach is proposed for agile method construction using the OPEN Process Framework, which consists of a metamodel and a collection ....Applying Method Engineering Techniques to the Construction of Agile Methodologies. Agile approaches to software development provide flexibility within the method but provide no assistance for improving the selected method. This second kind of flexibility is important to permit organizations to improve with time. To accomplish such improvement, a method engineering approach is proposed for agile method construction using the OPEN Process Framework, which consists of a metamodel and a collection of method components, stored in a repository. In collaboration with Eagle Datamation International, we will devise methods of constructing an agile method tailored to their business needs and then evaluate it in practice, monitoring as the method evolves and improves.Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less